CN103761703A - Single channel color image encryption method based on GT conversion and chaos - Google Patents
Single channel color image encryption method based on GT conversion and chaos Download PDFInfo
- Publication number
- CN103761703A CN103761703A CN201410018092.6A CN201410018092A CN103761703A CN 103761703 A CN103761703 A CN 103761703A CN 201410018092 A CN201410018092 A CN 201410018092A CN 103761703 A CN103761703 A CN 103761703A
- Authority
- CN
- China
- Prior art keywords
- conversion
- gyrator
- chaos
- arnold
- framework
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
A single channel color image encryption method based on GT conversion and chaos relates to two encryption frames. In the first encryption frame, first, normalization operation is performed on a color image, and the normalized image is decomposed into three red, green and blue component images; then, Arnold conversion is performed on the three component images to perform pixel permutation; finally, Logistic chaotic mapping, tent chaotic mapping and Gyrator conversion with an rotating angle of alpha are used for combining the three component images in chaos into data information relevant to a three-channel structure; in the second encryption frame, first, Arnold conversion is performed on data information relevant to the three-channel structure; then, phase modulation is performed on the Arnold conversion result; finally, Gyrator conversion is performed on a phase modulation result, the encryption process is completed, and gray image information is obtained.
Description
Technical field
The invention belongs to virtual optics information ciphering method technical field, relate to a kind of based on GT(revolution) the single channel color image encrypting method of conversion and chaos.
Background technology
In recent years, optical encryption technology is being played the part of more and more important effect in information security.Since Refregier and Javidi propose to encrypt based on double random phase, researcher proposes various image encryption technology, for example, and the fractional fourier transform of fractional fourier transform and expansion, phase place rejuvenation and the operation of random pixel scramble.The major defect of these methods is to use single beam to irradiate input picture, and the chromatic information of deciphering image is lost.Therefore color image encryption has become a severe problem, becomes a difficult problem for optical application.
Karim etc. propose the color image encrypting method based on thumbnail and two random mask.Zhao Daomu etc. are used wavelength-division multiplex and encrypt coloured image without lens Fresnel transform hologram, also have scholar to propose the image encryption algorithm that conversion is used two step phase shift interferences and Arnold to convert based on gyrator.Zhao Daomu and Chen Linfeng have not only proposed based on wavelength-division multiplex with without the multicolor image encryption algorithm of lens Fresnel transform hologram, and the chromatic information also having proposed based on fractional fourier transform and digital hologram is encrypted and composition algorithm.Joshi etc. propose the non-linear color image encryption scheme based on fractional fourier transform and natural logarithm.Chen Wen etc. propose the multicolor image encryption algorithm based on Arnold conversion and interference technique.Liu Zhengjun etc. propose the color image encrypting method of discrete cosine transform domain based on Arnold conversion and blend of colors operation, and the location of pixels of three passages of Arnold conversion scramble coloured image for the method, changes pixel value with discrete cosine transform.Muhammad not only proposes in GT territory, based on discrete cosine transform and the chromatic information encryption method of Hilbert phase bitmask radially, also to propose the chromatic information encryption method based on Arnold conversion.Hwang proposes the image encryption algorithm of Fresnel transform territory based on improving Gerchberg – Saxton algorithm.
Yet above-mentioned algorithm all belongs to hyperchannel to be encrypted, three passages of RGB that are about to coloured image are encrypted separately, are deciphered, and can make like this complexity of these encryption systems improve.In order to overcome this problem, researcher has proposed the various color image encryption schemes based on single channel technology.In the encipherment scheme that Liu Hongjun and Wang Xingyuan propose, first the coloured image of M * N pixel is converted to the gray level image of M * 3N, then use the sequence that segmentation chaotic maps produces to implement the horizontal scramble in position to this gray level image, next the picture breakdown after scramble is become to three parts, to this three part, use respectively Chen system to realize and obscure, spread.
Chen Wen proposes the optical asymmetric encryption system of the thumbnail based on coloured image, has used the phase truncation strategy in Fresnel territory in this system.Zhou Nanrun etc. have proposed the color image encryption scheme based on chaotic maps and fractional fourier transform, and in this scheme, form and aspect saturation magnetization is first encrypted or be decrypted into coloured image.In addition, Zhou Nanrun etc. have proposed the non-linear multicolor image encryption algorithm of mark Mellin transform based on real-time storage, and in this algorithm, ciphertext is real-time, are easy to show, transmit, store.Deng Xiaopeng has proposed a single channel asymmetric encipherment system with Zhao Daomu one width color image encryption has been become to a real-valued gray scale ciphertext, makes like this decrypting process quite simple.Above-mentioned algorithm is all the color image encryption based on single channel technology, although they have simplified ciphering process to a certain extent, still has the problems such as key space is little, security is low.
Summary of the invention
The object of the invention is to propose a kind of single channel color image encrypting method based on GT conversion and chaos, solve the problem that key space is little, security is low that prior art exists.
The technical solution adopted in the present invention is that the single channel color image encrypting method based on GT conversion and chaos, comprises two infill layer frameworks; Ground floor is encrypted in framework, first, coloured image is implemented normalization operation and be red (R), green (G) and blueness (B) three component images by the picture breakdown after normalization; Then, three component images are implemented respectively to Arnold conversion and carry out pixel scramble; Finally, use the Gyrator conversion that Logistic chaotic maps, tent chaotic maps, the anglec of rotation are α, three component images after scramble are combined as to the data message that triple channel structure is relevant; At the second layer, encrypt in framework, first, the relevant data message of this triple channel structure is carried out to Arnold conversion; Then, the result of Arnold conversion is implemented to phase-modulation; Finally, the result of phase-modulation is implemented to Gyrator conversion, complete whole encryption flow, obtain final gray level image information.
Feature of the present invention is also:
Ground floor is encrypted framework and is specifically comprised:
The first step: original color image is carried out to normalization operation, and be decomposed into R, G, tri-component images of B, be expressed as r (x, y), g (x, y) and b (x, y), in every width component image, pixel maximal value is 1;
Second step: it is n that component image r (x, y), g (x, y) and b (x, y) are implemented respectively to iterations
3, n
2and n
1arnold conversion, the noise image after scramble is expressed as A
n3(r (x, y)), A
n2(g (x, y)) and A
n1(b (x, y));
The 3rd step: first obtain first CHAOTIC PHASE MODULATED function, the blue component A of this function after by scramble
n1(b (x, y)) and Logistic Chaotic map sequence C
1(x, y) combines, and is exp{i π (A
n1(b (x, y))+C
1(x, y)) }; By the green component A after scramble
n2(g (x, y)) is complex signal H with first CHAOTIC PHASE MODULATED combination of function
1(x, y), to H
1(x, y) implements the Gyrator that the anglec of rotation is α and converts the intermediate variable H that obtains green component and blue component
gb(x, y), H
gbthe amplitude of (x, y) is T
gb(x, y), phase place is angle{H
gb(x, y) }; Then calculate second CHAOTIC PHASE MODULATED function, this function is by angle{H
gb(x, y) } and two-dimentional asymmetric tent sequence of mapping C
2(x, y) forms, and is exp{i π (angle{H
gb(x, y) }+C
2(x, y)) }; By the red component A after scramble
n3(r (x, y)) is complex signal H with second CHAOTIC PHASE MODULATED combination of function
2(x, y), to H
2(x, y) carries out the Gyrator conversion that the anglec of rotation is α, generates the relevant data message H of triple channel
rgb(x, y).
The second layer is encrypted framework and is specially: the first data message H relevant to triple channel
rgb(x, y) implements iterations is n
4arnold conversion, result and the chaos sequence exp{i π (C of modulation Arnold conversion
1(x, y)+C
2(x, y) }, to exchange the result making and implement α rank Gyrator conversion, the amplitude that extracts transformation results obtains final ciphertext I
final, the phase place of extracting transformation results obtains final phase place P
final.
Above-mentioned ground floor is encrypted in the second step of framework, and Arnold is transformed to:
Formula (1) has defined Arnold conversion, wherein ART represents Arnold conversion, f (x, y) for treating the plaintext image of scramble, f (x, y) size is M * M, (x, y) and (x ', y ') represent respectively Arnold conversion scramble before and the location of pixels after scramble, mod () accords with for complementation.
Above-mentioned ground floor is encrypted in the 3rd step of framework, and Gyrator is transformed to:
Formula (2) has defined optical imagery f
i(x
i, y
i) the result f of α level Gyrator conversion
o(x
o, y
o), K wherein
α(x
i, y
i, x
o, y
o) be the integral kernel function of Gyrator conversion, α is the progression (being the anglec of rotation) of Gyrator conversion, G
αrepresent α level Gyrator conversion, (x
i, y
i) and (x
o, y
o) represent respectively input, output plane coordinate, ∫ ∫ f
i(x
i, y
i) K
α(x
i, y
i, x
o, y
o) dx
idy
iexpression is to function f
i(x
i, y
i) K
α(x
i, y
i, x
o, y
o) respectively at x
idirection and y
idirection is done integral operation.Sin α is the sine value of progression (being the anglec of rotation) α;
Formula (3) has defined the integral kernel function K of Gyrator conversion
α(x
i, y
i, x
o, y
o), wherein, exp () is exponent arithmetic, and i is the imaginary part of symbol, and π is circular constant, and sin α is the sine value of progression (being the anglec of rotation) α.Cos α is the cosine value of progression (being the anglec of rotation) α.X
ifor input plane x direction coordinate, y
ifor input plane y direction coordinate, x
ofor output plane x direction coordinate, y
ofor output plane y direction coordinate.Hence one can see that, when α=0, and G
0{ f
i(x
i, y
i)=f
i(x
i, y
i); It when α=pi/2, is the Fourier transform of coordinate axis rotation pi/2; It when α=π, is inverse Fourier transform; When the pi/2 of α=3, be the inverse Fourier transform of coordinate axis rotation pi/2, when α is other order, the integral kernel K of Gyrator conversion
α(x
i, y
i, x
o, y
o) there is continuous amplitude and hyperbolic curve phase structure.
Above-mentioned ground floor is encrypted in the 3rd step of framework, and Logistic is mapped as:
f(x)=p·x·(1-x) (4)
Formula (4) has defined 1 dimensional Logistic Map, and wherein fractal parameter p is constant, and 0 < p≤4, and x is independent variable, and f (x) is Logistic mapping value.
x
n+1=p·x
n·(1-x
n) (5)
Formula (5) is the iteration form of formula (4), and wherein, fractal parameter p is constant, and 0 < p≤4, x
n, x
n+1for chaos sequence value, and x
n∈ (0,1), x
n+1∈ (0,1).
Above-mentioned ground floor is encrypted in the 3rd step of framework, and tent is mapped as:
Formula (6) has defined tent mapping, wherein x
n, x
n+1the iteration result that represents the n time and the n+1 time, x
0for iteration initial value, q is parameter, and when q ∈ (0,1), formula (6) is in chaos state.
Above-mentioned ground floor is encrypted in the 3rd step of framework, complex signal H
1(x, y) is:
H
1(x,y)=A
n2(g(x,y))·exp{iπ(A
n1(b(x,y))+C
1(x,y))} (7)
Formula (7) has defined the green component A after scramble
n2(g (x, y)) and first CHAOTIC PHASE MODULATED function exp{i π (A
n1(b (x, y))+C
1(x, y)) } the complex signal H that obtains after combination
1(x, y).Wherein exp{} is exponent arithmetic, and i is the imaginary part of symbol, and π is circular constant.
Above-mentioned ground floor is encrypted in the 3rd step of framework, complex signal H
2(x, y) is:
H
2(x,y)=A
n3(r(x,y))·exp{iπ(angle{H
1(x,y)}+C
2(x,y))} (8)
Formula (8) has defined the red component A after scramble
n3(r (x, y)) and second CHAOTIC PHASE MODULATED function exp{i π (angle{H
1(x, y) }+C
2(x, y)) } the complex signal H that obtains after combination
2(x, y).Wherein exp{} is exponent arithmetic, and i is the imaginary part of symbol, and π is circular constant, and angle{} is for extracting phase operation.
Encryption method of the present invention also comprises decrypting process, and decrypting process is the inverse process of encrypting.Comprise two-layer deciphering framework, ground floor deciphering framework: modulate final ciphertext I
finalwith final phase place P
final, exchange the result enforcement-α rank Gyrator conversion making, the result that modulating transformation obtains and phase place exp{-i π (C
1(x, y)+C
2(x, y) }, exchanging the result enforcement iterations making is m
4contrary Arnold conversion, after conversion, obtain triple channel related data H
rgb(x, y).Second layer deciphering framework is as follows:
The first step: to triple channel related data H
rgb(x, y) enforcement-α rank Gyrator conversion obtains complex signal H
2(x, y), extracts complex signal H
2the amplitude of (x, y), it is m that this amplitude is implemented to iterations
3contrary Arnold conversion obtain red component r (x, y).
Second step: extract complex signal H
2the phase place of (x, y) obtains angle{H
2(x, y) }, phase modulation angle{H
2(x, y) }/π-C
2(x, y) and amplitude T
gb(x, y), exchanges the result enforcement-α rank Gyrator conversion making and obtains complex signal H
1(x, y), extracts complex signal H
1the amplitude of (x, y), it is m that this amplitude is implemented to iterations
2contrary Arnold conversion obtain green component g (x, y).
The 3rd step: extract complex signal H
1the phase place of (x, y) obtains angle{H
1(x, y) }, to phase place angle{H
1(x, y) }/π-C
1(x, y) implements iterations is m
1contrary Arnold conversion obtain blue component b (x, y).Wherein, when plaintext image size is 256 * 256 pixel, m
1=192-n
1, m
2=192-n
2, m
3=192-n
3, m
4=192-n
4; When plaintext image size is 512 * 512 pixel, m
1=384-n
1, m
2=384-n
2, m
3=384-n
3, m
4=384-n
4.
The present invention has following beneficial effect:
1, use Gyrator transposition encryption coloured image, in its Optical Implementation device, the distance of lens and input, output plane is fixed, and the distance that has overcome lens and input in fractional fourier transform Optical Implementation device, output plane need be according to the shortcoming of different fractional fourier transform angular setting.
2, the present invention combines Gyrator conversion, Arnold conversion, Logistic chaotic maps and tent mapping, uses two-layer encipherment scheme, makes encrypted image have non-linear and randomness, has improved the security of encryption system.
3, the present invention has reduced the complexity of color image encryption system, and system is simple, easy to operate.
Accompanying drawing explanation
Fig. 1 is the encryption method schematic diagram that the present invention is based on the single channel color image encrypting method of GT conversion and chaos.
Fig. 2 is the decryption method schematic diagram that the present invention is based on the single channel color image encrypting method of GT conversion and chaos.
Fig. 3 is that to adopt the ciphertext graph of the original color image " Baboon.jpg " of the single channel color image encrypting method encryption the present invention is based on GT conversion and chaos to look like be gray level image.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.
The invention discloses a kind of single channel color image encrypting method based on GT conversion and chaos, the method comprises two infill layer frameworks.
Concrete steps are as follows:
Ground floor is encrypted framework:
The first step: the coloured image " Baboon.jpg " of 512 * 512 pixels of take is example, " Baboon.jpg " carried out to normalization operation, and " Baboon.jpg " after normalization is decomposed into R, G, B component image, be expressed as r (x, y), g (x, y) and b (x, y).
Second step: it is n that component image r (x, y), g (x, y) and b (x, y) are implemented respectively to iterations
3, n
2and n
1arnold conversion, the noise image after scramble is expressed as A
n3(r (x, y)), A
n2(g (x, y)) and A
n1(b (x, y)).
The 3rd step: first obtain first CHAOTIC PHASE MODULATED function, the blue component A of this function after by scramble
n1(b (x, y)) and Logistic Chaotic map sequence C
1(x, y) combines, i.e. exp{i π (A
n1(b (x, y))+C
1(x, y)) }.By the green component A after scramble
n2(g (x, y)) is combined as a complex signal H with first chaotic maps modulating function
1(x, y), to H
1(x, y) implements the Gyrator conversion that the anglec of rotation is α, is converted into the intermediate variable H of green component and blue component
gb(x, y).H
gbthe amplitude of (x, y) is T
gb(x, y), phase place is angle{H
gb(x, y) }, then obtain second CHAOTIC PHASE MODULATED function, this function is by angle{H
gb(x, y) } and two-dimentional asymmetric tent sequence of mapping C
2(x, y) forms, i.e. exp{i π (angle{H
gb(x, y) }+C
2(x, y)) }, by the red component A after scramble
n3(r (x, y)) and second CHAOTIC PHASE MODULATED combination of function are a new complex signal H
2(x, y), to H
2(x, y) carries out the Gyrator conversion that the anglec of rotation is α, generates the relevant data message H of triple channel
rgb(x, y).
The second layer is encrypted framework: the first data message H relevant to triple channel
rgb(x, y) implements iterations is n
4arnold conversion, result and the phase place exp{i π (C of modulation Arnold conversion
1(x, y)+C
2(x, y) }, to exchange the result making and implement α rank Gyrator conversion, the phase place of extracting transformation results obtains final phase place P
final, the amplitude that extracts transformation results obtains final ciphertext I
final.
Referring to Fig. 1, the method comprises two infill layer frameworks, and dotted line is ground floor Encryption Model above, and dotted line is second layer Encryption Model below.Ground floor is encrypted in framework, first, original color image is implemented normalization operation and is blue b (x, y), green g (x, y) and three component images of red r (x, y) by the picture breakdown after normalization; It is n that blue b (x, y), green g (x, y) and three components of red r (x, y) are implemented respectively to iterations
1, n
2and n
3arnold conversion carry out pixel scramble, after scramble, obtain respectively A
n1(b (x, y)), A
n2(g (x, y)) and A
n3(r (x, y)); Then, the blue component A after modulating transformation
n1(b (x, y)) and Logistic Chaotic map sequence C
1(x, y), obtains first CHAOTIC PHASE MODULATED function exp{i π (A
n1(b (x, y))+C
1(x, y)) }.By the green component A after scramble
n2(g (x, y)) is combined as a complex signal H with first chaotic maps modulating function
1(x, y), to H
1(x, y) implements the Gyrator that the anglec of rotation is α and converts the intermediate variable H that obtains green component and blue component
gb(x, y).H
gbthe amplitude of (x, y) is T
gb(x, y), || for extracting amplitude operation, H
gbthe phase place of (x, y) is angle{H
gb(x, y) }, next ask second CHAOTIC PHASE MODULATED function, this function is by angle{H
gb(x, y) } and two-dimentional asymmetric tent sequence of mapping C
2(x, y) forms, i.e. exp{i π (angle{H
gb(x, y) }+C
2(x, y)) }.By the red component A after scramble
n3(r (x, y)) and second CHAOTIC PHASE MODULATED combination of function are a new complex signal H
2(x, y), to H
2(x, y) implements the Gyrator conversion that the anglec of rotation is α, generates the relevant data message H of triple channel
rgb(x, y).At the second layer, encrypt in framework, first, the data message H relevant to triple channel structure
rgb(x, y) implements iterations is n
4arnold conversion obtain A
n4(H
rgb(x, y)), the result A of modulation Arnold conversion
n4(H
rgb(x, y)) and phase place exp{i π (C
1(x, y)+C
2(x, y) }, exchange the result enforcement α rank Gyrator conversion making and obtain H
final(x, y), extracts H
finalthe phase place of (x, y) obtains final phase place P
final, extract H
finalthe amplitude of (x, y) obtains final ciphertext I
final.Wherein, angle{H
final(x, y) } expression extraction H
finalthe phase place of (x, y), amplitude{H
final(x, y) } expression extraction H
finalthe amplitude of (x, y).G
αrepresent α rank Gyrator conversion, exp{} represents exponent arithmetic, and i is the imaginary part of symbol, and π is circular constant,
for multiply operation.
Fig. 2 is the decryption method schematic diagram that the present invention is based on the single channel color image encrypting method of GT conversion and chaos, is the inverse process of encryption method.Comprise two-layer deciphering framework, ground floor deciphering framework: modulate final ciphertext I
finalwith final phase place P
final, exchange the result enforcement-α rank Gyrator conversion making, the conjugation exp{-i π (C of the result that modulating transformation obtains and random phase
1(x, y)+C
2(x, y) }, exchanging the result enforcement iterations making is m
4contrary Arnold conversion, after conversion, obtain triple channel related data H
rgb(x, y).Second layer deciphering framework: first, to triple channel related data H
rgb(x, y) enforcement-α rank Gyrator conversion obtains complex signal H
2(x, y), extracts complex signal H
2the amplitude of (x, y), it is m that this amplitude is implemented to iterations
3contrary Arnold conversion obtain red component r (x, y).Secondly, extract complex signal H
2the phase place of (x, y) obtains angle{H
2(x, y) }, phase modulation angle{H
2(x, y) }/π-C
2(x, y) and amplitude T
gb(x, y), exchanges the result enforcement-α rank Gyrator conversion making and obtains complex signal H
1(x, y), extracts complex signal H
2the amplitude of (x, y), it is m that this amplitude is implemented to iterations
2contrary Arnold conversion obtain green component g (x, y).Finally, extract complex signal H
1the phase place of (x, y) obtains angle{H
1(x, y) }, to phase place angle{H
1(x, y) }/π-C
1(x, y) implements iterations is m
1contrary Arnold conversion obtain blue component b (x, y).Wherein, C
1the chaos sequence that (x, y) produces for Logistic chaotic maps, C
2the chaos sequence that (x, y) produces for tent mapping, angle{} is phase extraction operation, amplitude{} is amplitude extraction operation.G
-αexpression-α rank Gyrator conversion, exp{} represents exponent arithmetic, and i is the imaginary part of symbol, and π is circular constant,
for multiply operation.
Principle of work of the present invention: the present invention is transformed to master with Gyrator, the Arnold of usining conversion and CHAOTIC PHASE MODULATED are as ancillary technique.The present invention comprises two infill layer frameworks, and ground floor is encrypted in framework, first, coloured image is implemented normalization operation and be red (R), green (G) and blueness (B) three component images by the picture breakdown after normalization; Then, three components are implemented respectively to Arnold conversion and carry out pixel scramble; Finally, use the Gyrator conversion that Logistic chaotic maps, Kent chaotic maps, the anglec of rotation are α, three component images after scramble are combined as to the data message that triple channel structure is relevant.At the second layer, encrypt in framework, first, the relevant data message of this triple channel structure is carried out to Arnold conversion; Secondly, the result of Arnold conversion is implemented to phase-modulation; Finally, the result of phase-modulation is implemented to Gyrator conversion, complete whole encryption flow, obtain final gray level image information.
In the present invention, by the correlativity between neighbor, as the key technical indexes, in order to test the correlativity between neighbor, for original image and ciphertext graph picture, in horizontal, longitudinal and diagonal, 3000 pairs of pixels have been chosen at random respectively.Related coefficient Cor is defined as follows:
Formula (9) has defined the related coefficient between neighbor, wherein x
iand y
itwo neighbor gray-scale values in image, N=3000,
Table 1 is the correlativity calculation result of original image, ciphertext graph picture and PHASE DISTRIBUTION image, data from table are known, the degree of correlation in original image between neighbor is higher, the degree of correlation in ciphertext graph picture, PHASE DISTRIBUTION image between neighbor is very little, and therefore general disabled user can not look like to obtain from ciphertext graph any useful information of relevant original image.
The related coefficient of table 1 original image and ciphertext graph picture
Shown in Fig. 3, be to utilize the encrypted result of single channel color image encrypting method to a width coloured image the present invention is based on GT conversion and chaos, ciphertext graph looks like to present white noise and distributes, and therefore general disabled user can not look like to obtain from ciphertext graph any useful information of relevant original image.
Claims (10)
1. the single channel color image encrypting method based on GT conversion and chaos, is characterized in that, comprises two infill layer frameworks; Ground floor is encrypted in framework, first, coloured image is implemented normalization operation and be red (R), green (G) and blueness (B) three component images by the picture breakdown after normalization; Then, three component images are implemented respectively to Arnold conversion and carry out pixel scramble; Finally, use the Gyrator conversion that Logistic chaotic maps, tent chaotic maps, the anglec of rotation are α, three component images after scramble are combined as to the data message that triple channel structure is relevant; At the second layer, encrypt in framework, first, the relevant data message of this triple channel structure is carried out to Arnold conversion; Then, the result of Arnold conversion is implemented to phase-modulation; Finally, the result of phase-modulation is implemented to Gyrator conversion, complete whole encryption flow, obtain final gray level image information.
2. the single channel color image encrypting method based on GT conversion and chaos as claimed in claim 1, is characterized in that, ground floor is encrypted framework and specifically comprised:
The first step: original color image is carried out to normalization operation, and be decomposed into R, G, tri-component images of B, be expressed as r (x, y), g (x, y) and b (x, y), in every width component image, pixel maximal value is 1;
Second step: it is n that component image r (x, y), g (x, y) and b (x, y) are implemented respectively to iterations
3, n
2and n
1arnold conversion, the noise image after scramble is expressed as A
n3(r (x, y)), A
n2(g (x, y)) and A
n1(b (x, y));
The 3rd step: first obtain first CHAOTIC PHASE MODULATED function, the blue component A of this function after by scramble
n1(b (x, y)) and Logistic Chaotic map sequence C
1(x, y) combines, and is exp{i π (A
n1(b (x, y))+C
1(x, y)) }; By the green component A after scramble
n2(g (x, y)) is complex signal H with first CHAOTIC PHASE MODULATED combination of function
1(x, y), to H
1(x, y) implements the Gyrator that the anglec of rotation is α and converts the intermediate variable H that obtains green component and blue component
gb(x, y), H
gbthe amplitude of (x, y) is T
gb(x, y), phase place is angle{H
gb(x, y) }; Then calculate second CHAOTIC PHASE MODULATED function, this function is by angle{H
gb(x, y) } and two-dimentional asymmetric tent sequence of mapping C
2(x, y) forms, and is exp{i π (angle{H
gb(x, y) }+C
2(x, y)) }; By the red component A after scramble
n3(r (x, y)) is complex signal H with second CHAOTIC PHASE MODULATED combination of function
2(x, y), to H
2(x, y) carries out the Gyrator conversion that the anglec of rotation is α, generates the relevant data message H of triple channel
rgb(x, y).
3. the single channel color image encrypting method based on GT conversion and chaos as claimed in claim 1, is characterized in that, second layer encryption framework is specially: the first data message H relevant to triple channel
rgb(x, y) implements iterations is n
4arnold conversion, result and the chaos sequence exp{i π (C of modulation Arnold conversion
1(x, y)+C
2(x, y) }, to exchange the result making and implement α rank Gyrator conversion, the amplitude that extracts transformation results obtains final ciphertext I
final, the phase place of extracting transformation results obtains final phase place P
final.
4. the single channel color image encrypting method based on GT conversion and chaos as claimed in claim 2, is characterized in that, described ground floor is encrypted in the second step of framework, and Arnold is transformed to:
Formula (1) has defined Arnold conversion, wherein ART represents Arnold conversion, f (x, y) for treating the plaintext image of scramble, f (x, y) size is M * M, (x, y) and (x ', y ') represent respectively Arnold conversion scramble before and the location of pixels after scramble, mod () accords with for complementation.
5. the single channel color image encrypting method based on GT conversion and chaos as claimed in claim 2, is characterized in that, described ground floor is encrypted in the 3rd step of framework, and Gyrator is transformed to:
Formula (2) has defined optical imagery f
i(x
i, y
i) the result f of α level Gyrator conversion
o(x
o, y
o), K wherein
α(x
i, y
i, x
o, y
o) be the integral kernel function of Gyrator conversion, α is the progression (being the anglec of rotation) of Gyrator conversion, G
αrepresent α level Gyrator conversion, (x
i, y
i) and (x
o, y
o) represent respectively input, output plane coordinate, ∫ ∫ f
i(x
i, y
i) K
α(x
i, y
i, x
o, y
o) dx
idy
iexpression is to function f
i(x
i, y
i) K
α(x
i, y
i, x
o, y
o) respectively at x
idirection and y
idirection is done integral operation.Sin α is the sine value of progression (being the anglec of rotation) α;
Formula (3) has defined the integral kernel function K of Gyrator conversion
α(x
i, y
i, x
o, y
o), wherein, exp () is exponent arithmetic, and i is the imaginary part of symbol, and π is circular constant, and sin α is the sine value of progression (being the anglec of rotation) α.Cos α is the cosine value of progression (being the anglec of rotation) α.X
ifor input plane x direction coordinate, y
ifor input plane y direction coordinate, x
ofor output plane x direction coordinate, y
ofor output plane y direction coordinate.Hence one can see that, when α=0, and G
0{ f
i(x
i, y
i)=f
i(x
i, y
i); It when α=pi/2, is the Fourier transform of coordinate axis rotation pi/2; It when α=π, is inverse Fourier transform; It when the pi/2 of α=3, is the inverse Fourier transform of coordinate axis rotation pi/2.When α is other order, the integral kernel K of Gyrator conversion
α(x
i, y
i, x
o, y
o) there is continuous amplitude and hyperbolic curve phase structure.
6. the single channel color image encrypting method based on GT conversion and chaos as claimed in claim 2, is characterized in that, described ground floor is encrypted in the 3rd step of framework, and Logistic is mapped as:
f(x)=p·x·(1-x) (4)
Formula (4) has defined 1 dimensional Logistic Map, and wherein fractal parameter p is constant, and 0 < p≤4, and x is independent variable, and f (x) is Logistic mapping value;
x
n+1=p·x
n·(1-x
n) (5)
Formula (5) is the iteration form of formula (4), and wherein, fractal parameter p is constant, and 0 < p≤4, x
n, x
n+1for chaos sequence value, and x
n∈ (0,1), x
n+1∈ (0,1).
7. the single channel color image encrypting method based on GT conversion and chaos as claimed in claim 2, is characterized in that, described ground floor is encrypted in the 3rd step of framework, and tent is mapped as:
Formula (6) has defined tent mapping, wherein x
n, x
n+1the iteration result that represents the n time and the n+1 time, x
0for iteration initial value, q is parameter, and when q ∈ (0,1), formula (6) is in chaos state.
8. the single channel color image encrypting method based on GT conversion and chaos as claimed in claim 2, is characterized in that, described ground floor is encrypted in the 3rd step of framework, complex signal H
1(x, y) is:
H
1(x,y)=A
n2(g(x,y))·exp{iπ(A
n1(b(x,y))+C
1(x,y))} (7)
Formula (7) has defined the green component A after scramble
n2(g (x, y)) and first CHAOTIC PHASE MODULATED function exp{i π (A
n1(b (x, y))+C
1(x, y)) } the complex signal H that obtains after combination
1(x, y), wherein exp{} is exponent arithmetic, and i is the imaginary part of symbol, and π is circular constant.
9. the single channel color image encrypting method based on GT conversion and chaos as claimed in claim 2, is characterized in that, described ground floor is encrypted in the 3rd step of framework, complex signal H
2(x, y) is:
H
2(x,y)=A
n3(r(x,y))·exp{iπ(angle{H
1(x,y)}+C
2(x,y))} (8)
Formula (8) has defined the red component A after scramble
n3(r (x, y)) and second CHAOTIC PHASE MODULATED function exp{i π (angle{H
1(x, y) }+C
2(x, y)) } the complex signal H that obtains after combination
2(x, y), wherein exp{} is exponent arithmetic, and i is the imaginary part of symbol, and π is circular constant, and angle{} is for extracting phase operation.
10. the single channel color image encrypting method based on GT conversion and chaos as described in claim 1-9 any one, is characterized in that, also comprises decrypting process, described decrypting process is the inverse process of encrypting, comprise two-layer deciphering framework, ground floor deciphering framework is to modulate final ciphertext I
finalwith final phase place P
final, exchange the result enforcement-α rank Gyrator conversion making, the result that modulating transformation obtains and phase place exp{-i π (C
1(x, y)+C
2(x, y) }, exchanging the result enforcement iterations making is m
4contrary Arnold conversion, after conversion, obtain triple channel related data H
rgb(x, y); Second layer deciphering framework is as follows:
The first step: to triple channel related data H
rgb(x, y) enforcement-α rank Gyrator conversion obtains complex signal H
2(x, y), extracts complex signal H
2the amplitude of (x, y), it is m that this amplitude is implemented to iterations
3contrary Arnold conversion obtain red component r (x, y);
Second step: extract complex signal H
2the phase place of (x, y) obtains angle{H
2(x, y) }, phase modulation angle{H
2(x, y) }/π-C
2(x, y) and amplitude T
gb(x, y), exchanges the result enforcement-α rank Gyrator conversion making and obtains complex signal H
1(x, y), extracts complex signal H
1the amplitude of (x, y), it is m that this amplitude is implemented to iterations
2contrary Arnold conversion obtain green component g (x, y);
The 3rd step: extract complex signal H
1the phase place of (x, y) obtains angle{H
1(x, y) }, to phase place angle{H
1(x, y) }/π-C
1(x, y) implements iterations is m
1contrary Arnold conversion obtain blue component b (x, y).Wherein, when plaintext image size is 256 * 256 pixel, m
1=192-n
1, m
2=192-n
2, m
3=192-n
3, m
4=192-n
4; When plaintext image size is 512 * 512 pixel, m
1=384-n
1, m
2=384-n
2, m
3=384-n
3, m
4=384-n
4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410018092.6A CN103761703A (en) | 2014-01-15 | 2014-01-15 | Single channel color image encryption method based on GT conversion and chaos |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410018092.6A CN103761703A (en) | 2014-01-15 | 2014-01-15 | Single channel color image encryption method based on GT conversion and chaos |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103761703A true CN103761703A (en) | 2014-04-30 |
Family
ID=50528936
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410018092.6A Pending CN103761703A (en) | 2014-01-15 | 2014-01-15 | Single channel color image encryption method based on GT conversion and chaos |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103761703A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104050623A (en) * | 2014-06-06 | 2014-09-17 | 西安理工大学 | Asymmetric double-image encryption and decryption method based on chaos and cascade DFrRT |
CN104077739A (en) * | 2014-07-03 | 2014-10-01 | 苏州大学应用技术学院 | Color image quick encryption method |
CN105550972A (en) * | 2016-02-03 | 2016-05-04 | 广东工业大学 | Image encryption method for high dimension digital domain chaotic system |
CN106296560A (en) * | 2016-07-29 | 2017-01-04 | 广东工业大学 | A kind of multicolor image encryption algorithm of complex cascade chaos |
CN106651736A (en) * | 2016-09-30 | 2017-05-10 | 天津大学 | Optical image encryption method based on Gyrator transform and coupled chaos |
CN106815799A (en) * | 2016-12-19 | 2017-06-09 | 浙江画之都文化创意股份有限公司 | A kind of self adaptation artistic pattern forming method based on chaology |
CN107104790A (en) * | 2017-03-20 | 2017-08-29 | 上海师范大学 | Optical encryption method based on QR codes and array fingerprint key |
CN107800924A (en) * | 2017-09-11 | 2018-03-13 | 天津大学 | Wavelet transform chaos Double random phase single channel coloured picture encryption method |
CN108765248A (en) * | 2018-05-16 | 2018-11-06 | 西安理工大学 | The Color digital watermarking method of compressed sensing mark based on human-eye visual characteristic |
CN109086617A (en) * | 2018-08-14 | 2018-12-25 | 长春理工大学 | One-time pad optical image encryption decryption method based on fractional order quantum chaos |
CN109391463A (en) * | 2017-08-08 | 2019-02-26 | 深圳市中兴微电子技术有限公司 | A kind of image encryption, decryption method, equipment and computer readable storage medium |
CN109583216A (en) * | 2018-10-09 | 2019-04-05 | 天津大学 | The single channel color image encrypting method of resolution of vectors and phase code |
CN109639925A (en) * | 2018-12-19 | 2019-04-16 | 苏州科技大学 | Hartley transformation and the color image encipher-decipher method for intersecting coding |
CN109657484A (en) * | 2018-12-12 | 2019-04-19 | 苏州科技大学 | The multichannel image decoding method spliced based on gamma function and ciphertext |
CN110086953A (en) * | 2019-03-12 | 2019-08-02 | 天津大学 | The color image encrypting method with Gyrator transformation is decomposed based on QR |
CN111600645A (en) * | 2020-05-12 | 2020-08-28 | 电子科技大学 | Chaos sequence spread spectrum communication method based on time parameter |
CN113079393A (en) * | 2021-04-01 | 2021-07-06 | 江苏经贸职业技术学院 | Video stream encryption system based on two-dimensional exponential-sinusoidal hyperchaotic system |
-
2014
- 2014-01-15 CN CN201410018092.6A patent/CN103761703A/en active Pending
Non-Patent Citations (2)
Title |
---|
LIANSHENG SUI,BO GAO: "《Color image encryption based on gyrator transform and Arnold transform》", 《OPTICS LASER TECHNOLOGY》 * |
聂文梅: "《一种基于Arnold和Logistic双混沌系统的数字图像加密算法》", 《计算机安全》 * |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104050623A (en) * | 2014-06-06 | 2014-09-17 | 西安理工大学 | Asymmetric double-image encryption and decryption method based on chaos and cascade DFrRT |
CN104077739A (en) * | 2014-07-03 | 2014-10-01 | 苏州大学应用技术学院 | Color image quick encryption method |
CN105550972A (en) * | 2016-02-03 | 2016-05-04 | 广东工业大学 | Image encryption method for high dimension digital domain chaotic system |
CN106296560A (en) * | 2016-07-29 | 2017-01-04 | 广东工业大学 | A kind of multicolor image encryption algorithm of complex cascade chaos |
CN106651736A (en) * | 2016-09-30 | 2017-05-10 | 天津大学 | Optical image encryption method based on Gyrator transform and coupled chaos |
CN106815799A (en) * | 2016-12-19 | 2017-06-09 | 浙江画之都文化创意股份有限公司 | A kind of self adaptation artistic pattern forming method based on chaology |
CN106815799B (en) * | 2016-12-19 | 2020-01-21 | 浙江画之都文化创意股份有限公司 | Chaos theory-based adaptive art pattern generation method |
CN107104790A (en) * | 2017-03-20 | 2017-08-29 | 上海师范大学 | Optical encryption method based on QR codes and array fingerprint key |
CN109391463A (en) * | 2017-08-08 | 2019-02-26 | 深圳市中兴微电子技术有限公司 | A kind of image encryption, decryption method, equipment and computer readable storage medium |
CN107800924B (en) * | 2017-09-11 | 2019-09-10 | 天津大学 | Wavelet transform chaos Double random phase single channel coloured picture encryption method |
CN107800924A (en) * | 2017-09-11 | 2018-03-13 | 天津大学 | Wavelet transform chaos Double random phase single channel coloured picture encryption method |
CN108765248B (en) * | 2018-05-16 | 2022-06-17 | 陕西云宝影视文化传播有限公司 | Color image watermarking method based on human visual characteristic compressed sensing identification |
CN108765248A (en) * | 2018-05-16 | 2018-11-06 | 西安理工大学 | The Color digital watermarking method of compressed sensing mark based on human-eye visual characteristic |
CN109086617A (en) * | 2018-08-14 | 2018-12-25 | 长春理工大学 | One-time pad optical image encryption decryption method based on fractional order quantum chaos |
CN109583216A (en) * | 2018-10-09 | 2019-04-05 | 天津大学 | The single channel color image encrypting method of resolution of vectors and phase code |
CN109583216B (en) * | 2018-10-09 | 2023-06-06 | 天津大学 | Single-channel color image encryption method of vector decomposition and phase coding |
CN109657484A (en) * | 2018-12-12 | 2019-04-19 | 苏州科技大学 | The multichannel image decoding method spliced based on gamma function and ciphertext |
CN109639925A (en) * | 2018-12-19 | 2019-04-16 | 苏州科技大学 | Hartley transformation and the color image encipher-decipher method for intersecting coding |
CN109639925B (en) * | 2018-12-19 | 2020-06-30 | 苏州科技大学 | Hartley transform and cross-coding color image encryption and decryption method |
CN110086953A (en) * | 2019-03-12 | 2019-08-02 | 天津大学 | The color image encrypting method with Gyrator transformation is decomposed based on QR |
CN111600645A (en) * | 2020-05-12 | 2020-08-28 | 电子科技大学 | Chaos sequence spread spectrum communication method based on time parameter |
CN113079393A (en) * | 2021-04-01 | 2021-07-06 | 江苏经贸职业技术学院 | Video stream encryption system based on two-dimensional exponential-sinusoidal hyperchaotic system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103761703A (en) | Single channel color image encryption method based on GT conversion and chaos | |
CN103679625A (en) | Single-channel color image encryption method based on chaos and phase retrieval process | |
Gong et al. | Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform | |
Yao et al. | An asymmetric color image encryption method by using deduced gyrator transform | |
Guo et al. | Color image encryption by using Arnold and discrete fractional random transforms in IHS space | |
Abuturab | Securing color information using Arnold transform in gyrator transform domain | |
CN103903215B (en) | Many image encryption methods based on chaos and FrFT domains phase recovery process | |
CN103700058B (en) | Many image encryption methods based on fractional fourier domain phase template multiplexing | |
Liu et al. | Optical color image hiding scheme based on chaotic mapping and Hartley transform | |
Deng et al. | Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform | |
Abuturab | Asymmetric multiple information cryptosystem based on chaotic spiral phase mask and random spectrum decomposition | |
Alfalou et al. | Simultaneous compression and encryption of color video images | |
CN103716502B (en) | Encryption method based on iteration FrFT and chaotic single-channel color images | |
Abuturab | An asymmetric color image cryptosystem based on Schur decomposition in gyrator transform domain | |
CN103955883A (en) | Asymmetric double-image encryption method based on fractional Fourier domain phase recovery procedure | |
CN109583216B (en) | Single-channel color image encryption method of vector decomposition and phase coding | |
Liu et al. | Optical color image encryption based on computer generated hologram and chaotic theory | |
Abuturab | A superposition based multiple-image encryption using Fresnel-Domain high dimension chaotic phase encoding | |
CN103295185B (en) | Based on the asymmetrical image encryption method of random amplitude plate and Fourier transform | |
Abuturab | Single-channel color information security system using LU decomposition in gyrator transform domains | |
CN103955884A (en) | Double-image encryption method based on chaotic and discrete fraction random transform | |
Wang et al. | Multiple-image encryption and authentication in interference-based scheme by aid of space multiplexing | |
CN107800924B (en) | Wavelet transform chaos Double random phase single channel coloured picture encryption method | |
Wang et al. | Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg–Saxton algorithm in gyrator domain | |
Chen et al. | Asymmetric color cryptosystem based on compressed sensing and equal modulus decomposition in discrete fractional random transform domain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140430 |
|
RJ01 | Rejection of invention patent application after publication |